{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:11:51Z","timestamp":1749096711286,"version":"3.41.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319428352"},{"type":"electronic","value":"9783319428369"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42836-9_1","type":"book-chapter","created":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T02:30:38Z","timestamp":1470191438000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems"],"prefix":"10.1007","author":[{"given":"Yudai","family":"Komori","sequence":"first","affiliation":[]},{"given":"Kazuya","family":"Sakai","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Fukumoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1290672.1290674","volume":"3","author":"J Aspnes","year":"2007","unstructured":"Aspnes, J., Shah, G.: Skip graphs. ACM Trans. Algorithms 3(4), 37 (2007)","journal-title":"ACM Trans. Algorithms"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Chen, M., Chen, S.: ETAP: Enable Lightweight Anonymous RFID authentication with O(1) overhead. In: ICNP, pp. 267\u2013278 (2015)","DOI":"10.1109\/ICNP.2015.21"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Hoque, M.E., Rahman, F., Ahamed, S.I.: AnonPri: an efficient anonymous private authentication protocol. In: PerCom, pp. 102\u2013110 (2011)","DOI":"10.1109\/PERCOM.2011.5767573"},{"issue":"4","key":"1_CR4","first-page":"30","volume":"14","author":"Y Li","year":"2011","unstructured":"Li, Y., Deng, R.H., Lai, J., Ma, C.: On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4), 30 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Lu, L., Han, J., Hu, L., Liu, Y., Ni, L.M., Key-Updating, D.: Privacy-preserving authentication for RFID systems. In: PerCom, pp. 13\u201322 (2007)","DOI":"10.1109\/PERCOM.2007.13"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Lu, L., Han, J., Xiao, R., Liu, Y.: ACTION: breaking the privacy barrier for RFID systems. In: Infocom, pp. 1951\u20131961 (2009)","DOI":"10.1109\/INFCOM.2009.5062117"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID Issues, practices, and architectures. In: CCS, pp. 210\u2013219 (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Sun, M.-T., Sakai, K., Ku, W.-S., Lai, T.H., Vasilakos, A.V.: Private and secure tag access for large-scale RFID systems. IEEE Trans. Dependable Secur. Compt. (in press)","DOI":"10.1109\/TDSC.2015.2427833"},{"key":"1_CR9","unstructured":"Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Master Thesis, MIT (2003)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Yao, Q., Qi, Q., Han, J., Zhao, J., Li, X., Liu, Y.: Randomized RFID private authentication. In: PerCom, pp. 1\u201310 (2009)","DOI":"10.1109\/PERCOM.2009.4912773"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42836-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T11:44:52Z","timestamp":1749037492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42836-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319428352","9783319428369"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42836-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}